cybercrime
“Google Pharmacy” spam hitting inboxes
Google’s name and reputation is once again being misused by spammers trying to trick users into believing that what they are selling is endorsed or approved by the …
25 alleged Anons arrested
25 individuals suspected to be Anonymous members have been arrested during a coordinated international operation supported by Interpol across four countries in Europe and …
Thwarting attacks with genetically-inspired computer configuration systems
In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …
Horde FTP server hacked, files modified to include backdoor
The developers of the Horde open source software have issued a statement warning its users that a one of their FTP servers was discovered to have been breached and some files …
MasterCard and Silver Tail Systems combat online fraud
MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …
Hungarian sentenced for hacking, blackmailing Marriot
Attila Nemeth, a 26-year-old Hungarian national who tried to blackmail Marriot International into giving him a job by stealing the company’s internal documents and …
VeriSign hack: Reactions from the security community
VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …
Romanian hacker TinKode allegedly arrested
A 20-year old Romanian believed to be “TinKode”, the infamous hacker that has breached the systems and defaced the pages of several government organizations, has …
Defense companies persistently targeted by cyber spies
Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
The state of global cyber-readiness
McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures …
Web attacks peak at 38,000 an hour
Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)